Shogun Cybersecurity

2K posts

Shogun Cybersecurity banner
Shogun Cybersecurity

Shogun Cybersecurity

@ShogunCySec

The Computer is your friend.

Melbourne, Victoria Katılım Ağustos 2017
97 Takip Edilen258 Takipçiler
Justin Elze
Justin Elze@HackingLZ·
I have had this tattoo forever. I’m getting something similar with “Too Many Secrets” and the answering machine/blackbox from sneakers next week, but still kicking around ideas 🤔
Justin Elze tweet media
English
15
1
90
4K
Tib3rius
Tib3rius@0xTib3rius·
Putting DNS in the A Tier turned out to be the most contentious part of this. 😅
Tib3rius tweet media
English
6
2
43
4.8K
spencer
spencer@techspence·
Explain this photo in cybersecurity terms
spencer tweet media
English
270
31
930
157.5K
Shogun Cybersecurity
Shogun Cybersecurity@ShogunCySec·
@snyff Not necessarily.... strong findings often still need to be explained properly for the client to understand them and why they are important.
English
0
0
1
47
Louis Nyffenegger
Louis Nyffenegger@snyff·
People say “The report is the most important part of a pentest.” I used to agree. But the report is the packaging, not the product. The real value is in what you find: the vulnerabilities, the logic flaws, the broken assumptions. Strong findings speak for themselves.
English
3
4
83
5K
Jennifer Leggio
Jennifer Leggio@mediaphyter·
It's shocking how many vendors are pitching me as a security buyer simply because I am speaking at #RSAC. One, look at my job. Two, don't use speakers as targets. Three, how bad is your GTM program strategy if this is your approach? Does your CMO or CRO know you're doing this? They should stop you before you further hurt their brand. Do better.
GIF
English
3
2
7
1.7K
Shogun Cybersecurity
Shogun Cybersecurity@ShogunCySec·
@WeldPond Actually I was dialling into the uni mainframe on a 2400 baud modem, logging in using an older friend's account, running fetchmail, THEN running pine :)
English
0
0
0
12
Chris Wysopal
Chris Wysopal@WeldPond·
Who remembers when checking your email was opening a terminal window, SSHing into your account and running Pine?
English
115
29
463
25.9K
spencer
spencer@techspence·
Seen too many 100-page pentest reports that say nothing…a great pentest report should be - Precise - Clear - Actionable Otherwise, what’s even the point?
English
21
8
137
11K
rekdt
rekdt@rekdt·
When I worked for AWS, there was a guy who was speed running all the AWS certifications by just memorizing the practice tests, taking and passing one per week Wonder what he's doing now??
English
58
53
3.9K
295.5K
Sarah Young
Sarah Young@_sarahyo·
This t shirt is 🔥
Sarah Young tweet media
English
9
2
111
5.2K
Shogun Cybersecurity
Shogun Cybersecurity@ShogunCySec·
Sorry but if you're going to use pictures like that it has to rhyme..... "You'll never phish me!" is what you might think, But sooner all later we all click the link
Justin Elze@HackingLZ

🐟

English
0
0
0
28
Patrick Laverty 🎱
Patrick Laverty 🎱@plaverty9·
If someone wanted to become a Windows SysAdmin, where would they start? Classes at a Microsoft training center? Online?
English
5
1
6
1.6K
spencer
spencer@techspence·
What’s the most common mistake you see small IT teams make when it comes to security?
English
137
19
282
68.7K
Shogun Cybersecurity
Shogun Cybersecurity@ShogunCySec·
@troyhunt No the question is whether the president has the legal authority to unilaterally grant such an authorisation unilaterally. By your logic, anyone can authorise someone to hack into your computer, and the only question is whether the authorisation should have been given...
English
1
0
0
49
Troy Hunt
Troy Hunt@troyhunt·
@ShogunCySec Yes, it’s still authorised, the question remains whether it should have been
English
1
0
1
163
Troy Hunt
Troy Hunt@troyhunt·
I’ve had a few people flag this with me as a “data breach”. It’s not, it’s authorised access. Not liking that authorisation does not make it a data breach. If one of these guys then accidentally leaks it all over the place to unauthorised parties, *then* it’s a data breach!
Kim Zetter@KimZetter

“This is the...largest IT security breach in our country’s history.... You can’t un-ring this bell. Once these DOGE guys have access to these data systems, they can ostensibly do with it what they want.” theatlantic.com/technology/arc…

English
66
87
1.2K
238.1K
Shogun Cybersecurity retweetledi
rekdt
rekdt@rekdt·
Let’s be real, if you’re naive enough to believe you can break into Cyber with a bootcamp, you aren’t ready for a Cyber job
English
7
6
124
6.2K
Jack Rhysider 🏴‍☠️
Jack Rhysider 🏴‍☠️@JackRhysider·
Dear Tech Companies: Stop pretending your privacy policy isn't just: 'Your data is basically our data now' At least be honest about it 🤷‍♀️
English
25
52
539
16.3K
Audrey Renée Bentley
Audrey Renée Bentley@BentleyAudrey·
A man recently called me a "high value woman" is that something I can put on my resume or what??
English
9
0
42
2.5K
mRr3b00t
mRr3b00t@UK_Daniel_Card·
LINKEDIN CRINGE GOES BRRRR (BLACK TEAING IS NOT A THING!!!!)
mRr3b00t tweet media
English
41
1
170
13.3K
gabsmashh
gabsmashh@gabsmashh·
did a craft this weekend for my guest bathroom
gabsmashh tweet media
English
29
3
158
5.2K
Shogun Cybersecurity
Shogun Cybersecurity@ShogunCySec·
@d0rkph0enix I caught the end of the chiefs v bills game since I was visiting my American sister-in-law on the weekend, and I thought "Oh Lina's going to be happy" :D
English
1
0
2
40